☆37Mar 26, 2021Updated 4 years ago
Alternatives and similar repositories for kernel_challenges
Users that are interested in kernel_challenges are comparing it to the libraries listed below
Sorting:
- ☆17Sep 10, 2021Updated 4 years ago
- ☆13Dec 29, 2022Updated 3 years ago
- ☆13Jul 31, 2020Updated 5 years ago
- ☆10Jan 30, 2022Updated 4 years ago
- ☆12Dec 2, 2021Updated 4 years ago
- ☆13Dec 14, 2021Updated 4 years ago
- ugly code to check linux kernel memory and dump some internal structures☆48Nov 20, 2024Updated last year
- IDA Pro Python plugin to analyze and annotate Linux kernel alternatives☆24Dec 15, 2021Updated 4 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 9 months ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- Source code of "Dezhou Instrumentz" challenge from RealWorldCTF 2019 quals☆24Jan 3, 2021Updated 5 years ago
- ☆27Jul 30, 2021Updated 4 years ago
- Nintendo DS ROM loader module for IDA Pro☆37Feb 5, 2017Updated 9 years ago
- 强网杯pop_master go解法☆31Jul 13, 2021Updated 4 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Oct 11, 2020Updated 5 years ago
- ElementalX for Google Pixel☆22Oct 8, 2019Updated 6 years ago
- a linux kernel function inline hooking library☆30Oct 19, 2017Updated 8 years ago
- A GDB+GEF-style debugger for unloading Python pickles☆70Jul 5, 2025Updated 7 months ago
- exFAT filesystem driver for the Linux kernel (by Samsung Electronics Co., Ltd.)☆24Apr 7, 2018Updated 7 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆199Mar 14, 2024Updated last year
- A tool for manipulating Call of Duty savegames.☆11May 7, 2017Updated 8 years ago
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆35Apr 24, 2021Updated 4 years ago
- 收集规则☆30Dec 8, 2022Updated 3 years ago
- 日志分析库,nuclei 的另一种用法☆33Aug 28, 2022Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆37Jun 7, 2022Updated 3 years ago
- /* FORCE-PUSH ALERT */☆29Jul 24, 2025Updated 7 months ago
- 课程设计:C语言爬虫☆10Jul 8, 2018Updated 7 years ago
- BDResource Technology Co.,Ltd, engaged in making auto electrical diagnostic tools, such as X431,GM tech2,TMS374,Star 2000 Diagnostic Syst…☆15Oct 18, 2012Updated 13 years ago
- Prototype Pollution exploits collection☆37Aug 8, 2021Updated 4 years ago
- Collection of files for booting Linux kernels☆33Updated this week
- set of small and useful kernel modules/patches for tracing/debugging of different stuff and for learning of Linux kernel☆33Dec 25, 2017Updated 8 years ago
- Linux kernel LPE practice with an NPD vulnerability☆36Jul 11, 2023Updated 2 years ago
- Run PowerShell command without invoking powershell.exe☆35Nov 22, 2021Updated 4 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆36Aug 3, 2020Updated 5 years ago
- ☆34Jan 15, 2021Updated 5 years ago
- A monitoring script for AFL☆41Feb 8, 2017Updated 9 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆159Mar 3, 2021Updated 5 years ago
- Phoenix Framework Project☆42Oct 6, 2021Updated 4 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆42Aug 3, 2021Updated 4 years ago